CN113852587A - Two-dimensional code remote authorization method and equipment based on encryption algorithm - Google Patents

Two-dimensional code remote authorization method and equipment based on encryption algorithm Download PDF

Info

Publication number
CN113852587A
CN113852587A CN202010597795.4A CN202010597795A CN113852587A CN 113852587 A CN113852587 A CN 113852587A CN 202010597795 A CN202010597795 A CN 202010597795A CN 113852587 A CN113852587 A CN 113852587A
Authority
CN
China
Prior art keywords
dimensional code
information
server
user side
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010597795.4A
Other languages
Chinese (zh)
Inventor
孙永超
李照川
王伟兵
董晨晨
樊继硕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong ICity Information Technology Co., Ltd.
Original Assignee
Shandong ICity Information Technology Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong ICity Information Technology Co., Ltd. filed Critical Shandong ICity Information Technology Co., Ltd.
Priority to CN202010597795.4A priority Critical patent/CN113852587A/en
Publication of CN113852587A publication Critical patent/CN113852587A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1408Methods for optical code recognition the method being specifically adapted for the type of code
    • G06K7/14172D bar codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Electromagnetism (AREA)
  • Toxicology (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Artificial Intelligence (AREA)
  • Bioethics (AREA)
  • Software Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses a two-dimension code remote authorization method and equipment based on an encryption algorithm, and the method is characterized by comprising the following steps: receiving a two-dimensional code release request sent by a user side, and generating a secret key corresponding to the two-dimensional code release request; encrypting the release information in the two-dimensional code release request through the secret key to form encrypted information; receiving a two-dimensional code reading request sent by a verification end through scanning a two-dimensional code, wherein the two-dimensional code is generated through the encrypted information; and sending the two-dimension code reading request to the user side, and determining whether to send the key corresponding to the two-dimension code to the verification side according to the feedback of the user side. The embodiment provided by the invention can realize the remote authorization of the two-dimension code owner to the information in the two-dimension code, ensure the unauthorized unavailability of the information in the two-dimension code and enhance the control capability of the two-dimension code owner to the information in the two-dimension code.

Description

Two-dimensional code remote authorization method and equipment based on encryption algorithm
Technical Field
The application relates to the technical field of encryption algorithms, in particular to a two-dimensional code authorization method and equipment based on an encryption algorithm.
Background
With the development of 4G and 5G network technologies, more and more services can be performed through the internet. Meanwhile, the application of the two-dimensional code technology is also more and more extensive. The two-dimensional code is a pattern which is distributed on a plane according to a certain rule by using a certain specific geometric figure, is black and white and is alternated and records data symbol information; the concept of "0" and "1" bit stream forming the internal logic basis of computer is used ingeniously in coding, several geometric forms correspondent to binary system are used to represent literal numerical information, and can be automatically read by means of image input equipment or photoelectric scanning equipment so as to implement automatic information processing. The processes of information acquisition, website skipping, mobile phone payment, account login and the like can be performed through the two-dimensional code.
The information acquisition function of the two-dimensional code can be utilized to realize functions such as an electronic identity card, an electronic membership card, an electronic entrance ticket and the like, information of related certificate pictures or tickets is stored in the two-dimensional code, and a verification terminal reads related information in the two-dimensional code by scanning the two-dimensional code, so that related information of a two-dimensional code presenter is verified. Different systems can use different coding modes during specific use, and the authenticity of the two-dimensional code can be ensured through technologies such as electronic signature and adding time limit. However, in some application scenarios, the two-dimensional code is required to be valid for a long time, and the two-dimensional code can be copied and used in modes of printing, screenshot, photographing and the like, so that the application flexibility of the two-dimensional code is enhanced, and meanwhile, it is difficult to ensure that a user of the two-dimensional code is the owner of the two-dimensional code information, the risk that the two-dimensional code is stolen is brought, and the application of the two-dimensional code cannot take into account the flexibility and the safety. For functions such as electronic identity cards and electronic tickets, the safety of the electronic identity cards and the electronic tickets cannot be guaranteed by a more flexible use mode, and serious problems of information leakage and embezzlement can be caused.
Disclosure of Invention
The embodiment of the specification provides a two-dimensional code authorization method and equipment based on an encryption algorithm, which are used for solving the following technical problems in the prior art:
in the prior art, the application of the two-dimension code cannot be firm, flexible and safe, and private data cannot be guaranteed.
The embodiment of the specification adopts the following technical scheme:
the first aspect of the embodiment of the invention provides a two-dimensional code remote authorization method based on an encryption algorithm, which is applied to a server and comprises the following steps:
receiving a two-dimensional code release request sent by a user side, and generating a secret key corresponding to the two-dimensional code release request;
encrypting the release information in the two-dimensional code release request through the secret key to form encrypted information;
receiving a two-dimensional code reading request sent by a verification end through scanning a two-dimensional code, wherein the two-dimensional code is generated through the encrypted information;
and sending the two-dimension code reading request to the user side, and determining whether to send the key corresponding to the two-dimension code to the verification side according to the feedback of the user side.
The embodiment of the invention can realize the remote authorization of the two-dimension code owner to the information in the two-dimension code, ensure the unauthorized unavailability of the information in the two-dimension code and enhance the control capability of the two-dimension code owner to the information in the two-dimension code. The information contained in the two-dimensional code is encrypted through an encryption algorithm, and the actual information in the two-dimensional code can be obtained only by requesting to obtain a secret key after the code is scanned by the verification terminal; because the two-dimension code owner can remotely authorize the two-dimension code through the server, the two-dimension code presenter can be the two-dimension code owner himself, other individuals who own the two-dimension code copy can also be enabled, short time effectiveness does not need to be set for the two-dimension code, and usability of the two-dimension code is improved.
In one example, the receiving a two-dimensional code issuance request sent by a user side and generating a key corresponding to the two-dimensional code issuance request includes:
and verifying the identity information of the user side, and generating a secret key corresponding to the two-dimensional code issuing request after the verification is passed, wherein the two-dimensional code issuing request comprises the identity information of the user side.
The embodiment of the invention prevents the situation that the identity information of the user side is embezzled to issue the two-dimensional code by verifying the identity information of the user side.
In one example, further comprising:
the server generates a two-dimensional code according to the encryption information and sends the two-dimensional code to the user side; or the like, or, alternatively,
and the server side sends the encrypted information to the user side, so that the user side generates a two-dimensional code according to the encrypted information.
In one example, after the generating the key corresponding to the two-dimensional code issuing request, the method further includes:
and associating the secret key with the identity information and the two-dimension code name of the user side in the two-dimension code issuing request, and then storing the secret key and the identity information and the two-dimension code name of the user side in the two-dimension code issuing request into a server side.
The embodiment of the invention stores the secret key in the server, so that the storage mode of the secret key is safer, and the safety of the information in the two-dimensional code is also ensured.
In one example, the server generates a two-dimensional code according to the encryption information, including:
and the server generates a two-dimensional code according to the encrypted information, the identity information of the user side and the name of the two-dimensional code.
The second aspect of the embodiments of the present invention provides a two-dimensional code remote authorization method based on an encryption algorithm, which is applied to a user side, and includes:
sending a two-dimensional code release request to a server, enabling the server to generate a corresponding secret key according to the two-dimensional code release request, and enabling the server to encrypt release information in the two-dimensional code release request through the secret key to form encrypted information;
receiving a two-dimensional code reading request sent by a verification terminal through scanning a two-dimensional code, wherein the two-dimensional code is generated through the encrypted information, and the two-dimensional code reading request is sent to a server terminal by the verification terminal and then forwarded to a user terminal by the server terminal;
and feeding back a confirmation result to the server to determine whether the server sends the secret key to the verifying terminal.
In one example, the server generates a two-dimensional code according to the encrypted information, and sends the two-dimensional code to the user side; or the like, or, alternatively,
and the user side receives the encrypted information sent by the server side, and generates a two-dimensional code according to the encrypted information.
In one example, the generating, by the user side, a two-dimensional code according to the encryption information includes:
and the user side generates the two-dimensional code according to the encryption information, the identity information of the user side and the name of the two-dimensional code.
In one example, further comprising:
and storing the secret key, the identity information of the user side and the two-dimensional code name in the server side.
The third aspect of the embodiment of the invention provides a two-dimensional code remote authorization method based on an encryption algorithm, which is applied to a verification terminal, and the method comprises the following steps:
sending a two-dimensional code reading request to a server by scanning a two-dimensional code, so that the server forwards the two-dimensional code reading request to a user side;
and receiving feedback information sent by a server, and determining whether the two-dimensional code has the right to scan according to the feedback information.
A fifth aspect of the embodiments of the present invention provides a two-dimensional code remote authorization device based on an encryption algorithm, including:
a processor; and
a memory communicatively coupled to the processor, wherein,
the memory has stored thereon instructions executable by the processor to enable the processor to implement the method of the first, second or third aspect of the embodiments of the present invention.
The embodiment of the specification adopts at least one technical scheme which can achieve the following beneficial effects:
the embodiment provided by the invention can realize the remote authorization of the two-dimension code owner to the information in the two-dimension code, ensure the unauthorized unavailability of the information in the two-dimension code and enhance the control capability of the two-dimension code owner to the information in the two-dimension code. The information contained in the two-dimensional code is encrypted through an encryption algorithm, and the actual information in the two-dimensional code can be obtained only by requesting to obtain a secret key after the code is scanned by the verification terminal; because the two-dimension code owner can remotely authorize the two-dimension code through the server, the two-dimension code presenter can be the two-dimension code owner himself, other individuals who own the two-dimension code copy can also be enabled, short time effectiveness does not need to be set for the two-dimension code, and usability of the two-dimension code is improved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 is a schematic flow chart of a method provided in the first aspect of the embodiment of the present invention;
FIG. 2 is a schematic flow chart of a method provided in a second aspect of the embodiment of the present invention;
FIG. 3 is a schematic flow chart of a method provided in a third aspect of an embodiment of the present invention;
fig. 4 is a schematic diagram of an apparatus framework according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present disclosure more apparent, the technical solutions of the present disclosure will be clearly and completely described below with reference to the specific embodiments of the present disclosure and the accompanying drawings. It should be apparent that the described embodiments are only some of the embodiments of the present application, and not all of the embodiments. All other embodiments obtained by a person skilled in the art without making any inventive step based on the embodiments in the description belong to the protection scope of the present application.
In order to enhance the control capability of a two-dimension code owner on the two-dimension code and reduce the risk of stealing the two-dimension code at a user end, the embodiment of the invention designs an authorization mechanism. When the two-dimensional code is scanned for use, an authorization step of a two-dimensional code owner is added, and only after authorization approval of the two-dimensional code owner, the content contained in the two-dimensional code can be displayed correctly and completely. The embodiment of the invention realizes the design through an encryption algorithm, the encrypted information is put into the two-dimensional code, the verification terminal can only obtain the encrypted information after scanning the code, and the verification terminal can only decrypt the information after the two-dimensional code owner agrees to send the secret key to the verification terminal, so that the related information contained in the two-dimensional code is obtained.
The embodiment of the invention provides a two-dimension code information remote authorization method based on an encryption algorithm, which is characterized in that a two-dimension code owner is endowed with stronger control capability on information in a two-dimension code through the encryption algorithm, and the interaction among the two-dimension code owner, a two-dimension code presenter, a two-dimension code verifying end and a server is designed, so that the relevant information in the two-dimension code can be displayed only after the two-dimension code owner agrees after each code scanning, the risk of stealing the two-dimension code is reduced, and the contradiction between flexibility and safety when the two-dimension code is used is solved to a certain extent.
Before the two-dimension code information remote authorization method is used, a two-dimension code owner and a two-dimension code verification end both need to be registered at a server. When the two-dimensional code is generated, the two-dimensional code owner can obtain the two-dimensional code or the encrypted information generated by the server for the server, the two-dimensional code comprises the identity of the two-dimensional code owner in a plaintext form and the name of the two-dimensional code, the actual contents of the two-dimensional code, such as identity information, bill information and the like, exist in a ciphertext form, the server generates a secret key and encrypts related information, and the server simultaneously stores the name of the two-dimensional code, the owner and the secret key used in encryption. Because the plaintext before encryption and the key used for encryption are both at the server side, even the owner of the two-dimensional code cannot forge the two-dimensional code, and the security of the two-dimensional code is further enhanced.
The two-dimensional code presenter can be the owner of the two-dimensional code, or any person who owns the two-dimensional code in the form of screenshot, photo or print copy, the two-dimensional code presenter presents the two-dimensional code to the two-dimensional code verifying terminal, the verifying terminal cannot directly display the related content of the two-dimensional code after scanning, but reads the owner identity and the name content of the two-dimensional code in the plaintext in the two-dimensional code, and sends a reading request of the two-dimensional code of the owner to the server, and the server sends an application request of the verifying terminal to the two-dimensional code owner. And after receiving the request, the owner judges whether to approve the request and sends the approval to the server. If the owner agrees, the server sends the stored corresponding key to the verifying end, and the verifying end decrypts by using the key to obtain the actual content in the two-dimensional code; otherwise, sending the information of refusing the request to the verification terminal.
The technical solutions provided by the embodiments of the present application are described in detail below with reference to the accompanying drawings.
Fig. 1 is a schematic flow chart of a method provided in the first aspect of the embodiment of the present invention; the method is applied to the server side, and as shown in the figure, the method comprises the following steps:
s101, receiving a two-dimensional code release request sent by a user side, and generating a key corresponding to the two-dimensional code release request;
s102, encrypting the release information in the two-dimensional code release request through the secret key to form encrypted information;
s103, receiving a two-dimensional code reading request sent by a verification terminal through scanning a two-dimensional code, wherein the two-dimensional code is generated through the encrypted information;
s104, the two-dimension code reading request is sent to the user side, and whether the secret key corresponding to the two-dimension code is sent to the verification side or not is determined according to feedback of the user side.
The authorization method provided by the embodiment of the invention mainly comprises two stages, namely an encrypted two-dimensional code generation stage and an encrypted two-dimensional code reading stage.
The encrypted two-dimensional code generation stage mainly comprises the steps that a two-dimensional code owner (a user side) sends a request for generating the two-dimensional code to a server side, the server side encrypts relevant information and sends the information to the two-dimensional code owner, and the two-dimensional code owner generates the two-dimensional code from the encrypted information; further, the specific implementation of this stage may be:
the two-dimension code owner sends a request for generating the encrypted two-dimension code to the server side;
the server side verifies the identity of the two-dimensional code owner and generates a secret key after the verification is passed;
the server side encrypts the information contained in the two-dimensional code by using the key and sends the encrypted information to the owner of the two-dimensional code;
the two-dimensional code owner generates the two-dimensional code according to the encrypted information, and the two-dimensional code also comprises a two-dimensional code name and a plaintext of the identity information of the owner.
And in the encrypted two-dimensional code reading stage, a two-dimensional code presenter presents the two-dimensional code, a verification terminal obtains encrypted information contained in the two-dimensional code by scanning the two-dimensional code and sends a reading request of the two-dimensional code to a server terminal, the server terminal sends the reading request to a two-dimensional code owner, the two-dimensional code owner judges whether to agree with the verification terminal to read real information and sends a result to the server terminal, if the owner agrees, the server terminal sends a secret key to the verification terminal, the verification terminal decodes the secret key to obtain information in the two-dimensional code, otherwise, the server terminal refuses to read and send the information to the verification terminal. The method specifically comprises the following steps:
the two-dimensional code display direction verifies that the end displays the two-dimensional code, the verification scans the two-dimensional code, and the two-dimensional code display party can be the owner of the two-dimensional code or other individuals owning the two-dimensional code;
the verification end obtains the name of the two-dimensional code, the identity of the two-dimensional code and the encrypted information through scanning, and sends an information obtaining request for the two-dimensional code to the server end;
the server side sends the request to a corresponding two-dimensional code owner;
the two-dimensional code owner judges whether the check terminal agrees to check the information in the two-dimensional code and sends the agreement to the server terminal;
if yes, the server side sends the secret key of the two-dimensional code to the verification side, and if not, the server side sends refusal reading;
if the verification end receives the secret key, the encrypted information in the two-dimensional code is decrypted to obtain the information contained in the two-dimensional code; otherwise, the information in the two-dimensional code cannot be read.
It should be noted that the two-dimensional code generated by the two-dimensional code owner should include the identity of the two-dimensional code owner in the form of a plaintext and the name of the two-dimensional code, the corresponding owner can send a reading request for the name of the corresponding two-dimensional code only by reading related information after checking the code, and the key stored in the server should correspond to the name of the two-dimensional code and the identity of the two-dimensional code owner, so that the key of the two-dimensional code can be accurately sent.
FIG. 2 is a schematic flow chart of a method provided in a second aspect of the embodiment of the present invention; the method is applied to a user side, and as shown in fig. 2, the method includes:
s201, sending a two-dimension code release request to a server, enabling the server to generate a corresponding secret key according to the two-dimension code release request, and enabling the server to encrypt release information in the two-dimension code release request through the secret key to form encrypted information;
s202, receiving a two-dimensional code reading request sent by a verification terminal through scanning a two-dimensional code, wherein the two-dimensional code is generated through the encrypted information, and the two-dimensional code reading request is sent to a server terminal by the verification terminal and then forwarded to a user terminal by the server terminal;
s203 feeds back a confirmation result to the server to determine whether the server sends the key to the verifying side.
The second aspect of the embodiment of the present invention is mainly different from the first aspect in that the two-dimensional code is generated by the server, and the two-dimensional code is generated for the user side by the server, and since the plaintext before encryption and the key used for encryption are both at the server, even if the owner of the two-dimensional code himself cannot forge the two-dimensional code, so that the security of the two-dimensional code is further enhanced.
The detailed description in the embodiments of the present invention only needs to refer to the first aspect of the embodiments of the present invention, and is not described herein again.
Fig. 3 is a schematic flow chart of a method provided in the third aspect of the embodiment of the present invention. The method is applied to a verification terminal, and as shown in the figure, the method comprises the following steps:
s301, sending a two-dimensional code reading request to a server by scanning a two-dimensional code, and enabling the server to forward the two-dimensional code reading request to a user side;
s302, receiving feedback information sent by a server, and determining whether the two-dimensional code has the right to scan according to the feedback information.
The detailed description in the embodiment of the present invention only needs to refer to the first aspect and the second aspect of the embodiment of the present invention, and is not described herein again.
Based on the same idea, some embodiments of the present application further provide a device corresponding to the above method.
Fig. 4 is a schematic diagram of an apparatus framework provided in an embodiment of the present invention, and a two-dimensional code remote authorization apparatus based on an encryption algorithm is characterized by including:
a processor; and
a memory communicatively coupled to the processor, wherein,
the memory has stored thereon instructions executable by the processor to enable the processor to implement the methods of the first, second, third and fourth aspects of the embodiments of the present invention.
The embodiments in the present application are described in a progressive manner, and the same and similar parts among the embodiments can be referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the device and media embodiments, the description is relatively simple as it is substantially similar to the method embodiments, and reference may be made to some descriptions of the method embodiments for relevant points.
The device and the medium provided by the embodiment of the application correspond to the method one to one, so the device and the medium also have the beneficial technical effects similar to the corresponding method.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is directed to methods, apparatus (systems), and computer program products according to embodiments of the present invention
A flowchart and/or block diagram of an article. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (10)

1. A two-dimension code remote authorization method based on an encryption algorithm is characterized by comprising the following steps:
receiving a two-dimensional code release request sent by a user side, and generating a secret key corresponding to the two-dimensional code release request;
encrypting the release information in the two-dimensional code release request through the secret key to form encrypted information;
receiving a two-dimensional code reading request sent by a verification end through scanning a two-dimensional code, wherein the two-dimensional code is generated through the encrypted information;
and sending the two-dimension code reading request to the user side, and determining whether to send the key corresponding to the two-dimension code to the verification side according to the feedback of the user side.
2. The method of claim 1, further comprising:
the server generates a two-dimensional code according to the encryption information and sends the two-dimensional code to the user side; or the like, or, alternatively,
and the server side sends the encrypted information to the user side, so that the user side generates a two-dimensional code according to the encrypted information.
3. The method of claim 1, wherein after generating the key corresponding to the two-dimensional code issuance request, the method further comprises:
and associating the secret key with the identity information and the two-dimension code name of the user side in the two-dimension code issuing request, and then storing the secret key and the identity information and the two-dimension code name of the user side in the two-dimension code issuing request into a server side.
4. The method of claim 2, wherein the server generates a two-dimensional code according to the encryption information, and the method comprises:
and the server generates a two-dimensional code according to the encrypted information, the identity information of the user side and the name of the two-dimensional code.
5. A two-dimension code remote authorization method based on an encryption algorithm is characterized by comprising the following steps:
sending a two-dimensional code release request to a server, enabling the server to generate a corresponding secret key according to the two-dimensional code release request, and enabling the server to encrypt release information in the two-dimensional code release request through the secret key to form encrypted information;
receiving a two-dimensional code reading request sent by a verification terminal through scanning a two-dimensional code, wherein the two-dimensional code is generated through the encrypted information, and the two-dimensional code reading request is sent to a server terminal by the verification terminal and then forwarded to a user terminal by the server terminal;
and feeding back a confirmation result to the server to determine whether the server sends the secret key to the verifying terminal.
6. The method of claim 5, wherein the two-dimensional code is generated by the encrypted information, and comprises:
the server generates a two-dimensional code according to the encryption information and sends the two-dimensional code to the user side; or the like, or, alternatively,
and the user side receives the encrypted information sent by the server side, and generates a two-dimensional code according to the encrypted information.
7. The method of claim 6, wherein the user side generates a two-dimensional code according to the encryption information, and the method comprises:
and the user side generates the two-dimensional code according to the encryption information, the identity information of the user side and the name of the two-dimensional code.
8. The method of claim 5, further comprising:
and storing the secret key, the identity information of the user side and the two-dimensional code name in the server side.
9. A two-dimension code remote authorization method based on an encryption algorithm is characterized by comprising the following steps:
sending a two-dimensional code reading request to a server by scanning a two-dimensional code, so that the server forwards the two-dimensional code reading request to a user side;
and receiving feedback information sent by a server, and determining whether the two-dimensional code has the right to scan according to the feedback information.
10. A two-dimensional code remote authorization device based on an encryption algorithm is characterized by comprising:
a processor; and
a memory communicatively coupled to the processor, wherein,
the memory has stored thereon instructions executable by the processor to enable the processor to implement the method of claim 1.
CN202010597795.4A 2020-06-28 2020-06-28 Two-dimensional code remote authorization method and equipment based on encryption algorithm Pending CN113852587A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010597795.4A CN113852587A (en) 2020-06-28 2020-06-28 Two-dimensional code remote authorization method and equipment based on encryption algorithm

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010597795.4A CN113852587A (en) 2020-06-28 2020-06-28 Two-dimensional code remote authorization method and equipment based on encryption algorithm

Publications (1)

Publication Number Publication Date
CN113852587A true CN113852587A (en) 2021-12-28

Family

ID=78972099

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010597795.4A Pending CN113852587A (en) 2020-06-28 2020-06-28 Two-dimensional code remote authorization method and equipment based on encryption algorithm

Country Status (1)

Country Link
CN (1) CN113852587A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115168827A (en) * 2022-08-19 2022-10-11 中关村科学城城市大脑股份有限公司 Two-dimensional code generating method and two-dimensional code reading method containing identity information

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104994070A (en) * 2015-05-27 2015-10-21 福州惟实信息科技有限公司 Information transmission method capable of verifying information source based on encrypted double-layered two-dimension bar code
CN105279469A (en) * 2015-09-15 2016-01-27 重庆智韬信息技术中心 Two-dimension code oriented authorization method
CN107395581A (en) * 2017-07-11 2017-11-24 上海众人网络安全技术有限公司 Quick Response Code generates and read method, device, system, equipment and storage medium
CN107992768A (en) * 2017-11-29 2018-05-04 努比亚技术有限公司 A kind of method of information protection, terminal device and storage medium
CN108537314A (en) * 2018-03-27 2018-09-14 中国工商银行股份有限公司 Product marketing system and method based on Quick Response Code
CN109729046A (en) * 2017-10-31 2019-05-07 北京京东尚科信息技术有限公司 Two-dimensional code scanning method and terminal, authentication method and server and service system
CN109859348A (en) * 2017-11-30 2019-06-07 长城汽车股份有限公司 A kind of authorization method of remote door access, apparatus and system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104994070A (en) * 2015-05-27 2015-10-21 福州惟实信息科技有限公司 Information transmission method capable of verifying information source based on encrypted double-layered two-dimension bar code
CN105279469A (en) * 2015-09-15 2016-01-27 重庆智韬信息技术中心 Two-dimension code oriented authorization method
CN107395581A (en) * 2017-07-11 2017-11-24 上海众人网络安全技术有限公司 Quick Response Code generates and read method, device, system, equipment and storage medium
CN109729046A (en) * 2017-10-31 2019-05-07 北京京东尚科信息技术有限公司 Two-dimensional code scanning method and terminal, authentication method and server and service system
CN107992768A (en) * 2017-11-29 2018-05-04 努比亚技术有限公司 A kind of method of information protection, terminal device and storage medium
CN109859348A (en) * 2017-11-30 2019-06-07 长城汽车股份有限公司 A kind of authorization method of remote door access, apparatus and system
CN108537314A (en) * 2018-03-27 2018-09-14 中国工商银行股份有限公司 Product marketing system and method based on Quick Response Code

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115168827A (en) * 2022-08-19 2022-10-11 中关村科学城城市大脑股份有限公司 Two-dimensional code generating method and two-dimensional code reading method containing identity information

Similar Documents

Publication Publication Date Title
US11743038B2 (en) Methods and systems of providing verification of information using a centralized or distributed ledger
CN109729046B (en) Two-dimensional code scanning method and terminal, authentication method and server and service system
TWI719470B (en) Tag data generation method, tag and data processing based on near field communication (NFC) tag
CN110290134B (en) Identity authentication method, identity authentication device, storage medium and processor
US20150310436A1 (en) Securely Storing and Using Sensitive Information for Making Payments Using a Wallet Application
US11870919B2 (en) Method and system for authentication credential
CN103559614A (en) Method of bearer payment
TW201604804A (en) System for verifying data displayed dynamically by mobile and method thereof
CN104715370A (en) Method and system for carrying out safety payment based on encrypted two-dimension code
CN105187357A (en) Two-dimension code verification method and system
CN111709752A (en) Virtual resource processing method and device, computer readable medium and electronic equipment
KR101754486B1 (en) Method for Providing Mobile Payment Service by Using Account Information
KR101604622B1 (en) Method for Processing Mobile Payment by Using Encryption Matrix Authentication
CN113704734A (en) Distributed digital identity-based method for realizing certificate verification and related device
CN113852587A (en) Two-dimensional code remote authorization method and equipment based on encryption algorithm
CN113114610B (en) Stream taking method, device and equipment
KR100773582B1 (en) system and method for processing coupon contents with enhanced security
CN111460466A (en) Block chain-based electronic ticket management method, device and medium
JP6515080B2 (en) INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND PROGRAM
CN113111360A (en) File processing method
CN112101935A (en) Processing method and device for block chain rechargeable card
US12126715B2 (en) Methods and systems of providing verification of information using a centralized or distributed ledger
CN112488686B (en) Secure payment method, system, electronic device and readable storage medium
CN118468336A (en) Image-based information processing method, device, equipment, storage medium and product
JP2023179334A (en) Authentication method, authentication system, portable information device, and authentication device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20211228